«Critical Infrastructures Security Modeling, Enforcement and Runtime Checking » Anas Abou ElKalam ENSEEIHT, Toulouse
10h30-11h00
Coffee Break
11h00-13h00
Session R1: Regular Papers
«Formal approaches for security»
An Algebraic-Functional Framework for Distributed Access
Control Clara Bertolissi, Maribel Fernandez
Aspect-based Enforcement of Formal Delegation Policies Slim Kallel, Anis Charfi, Mira Mezini, Mohamed jmaiel
Access Control for Collaborative Systems: A Comparative Analysis amine baina, Yves Deswarte, Anas Abou El Kalam, Mohamed Kaaniche
An ontology-based approach to react to network attacks Nora Cuppens-Boulahia, Frederic Cuppens, Jorge E. López de Vergara, Enrique Vazquez, Javier Guerra, Hervé Debar
11h00-13h00
Session R2: Regular Papers
« Intrusion detection and web security »
Anomaly based Intrusion detection using Distributed Intelligent systems Benoit More
Un mécanisme de détection d'intrusions adaptative à base d’agents Mohamed Cheikh, Salima Hacini, Zizette Boufaida
Policy-Based Intrusion Detection in Web Applications by Monitoring Java Information Flows Guillaume Hiet, Valérie Viet Triem Tong, Ludovic Me, Benjamin Morin
Efficient Detection of DDoS Attacks with Important Attributes Wei Wang, Sylvain Gombault
13h00-15h00
Lunch
Tutorial part 1
« Securing the Service Oriented Infrastructure: Solutions supporting the secure integration of services across Enterprises » David Brossard, BT Security Research Centre Theo Dimitrakos, BT Security Research Centre
16h30-17h00
Coffee Break
17h00-18h30
Tutorial part 2
« Securing the Service Oriented Infrastructure: Solutions supporting the secure integration of services across Enterprises » David Brossard, BT Security Research Centre Theo Dimitrakos, BT Security Research Centre
A Formal Security Framework for Mobile Agent Systems: Specification and Verification Monia Loulou, Ahmed Hadj Kacem, Mohamed Mosbah, mohamed Jmaiel
Verification of Workflow Processes under Multilevel Security Considerations Kamel Barkaoui, Rahma Ben Ayed, Hanifa Boucheneb, Awatef Hicheur
If only I can trust my police! SIM : an agent-based audit solution of access right deployment through open network Christophe Incoul, Benjamin GATEAU, Jocelyn Aubert, Nicolas Bounoughaz, Christophe Feltus
Security Analysis of the Dependability, Security, Reconfigurability Framework Tim Hartog, Geert Kleinhuis
Analysis of Peer-to-Peer Networks from a Dependability Perspective Hakem Beitollahi, Geert Deconinck
A Byzantine Solution to Early Detect Massive Attacks Khaled Barbaria, Belhassen Zouari
Session R5: Regular Papers « Anonymous authentication and privacy »
Automated Reaction based on Risk Analysis and Attackers Skills in Intrusion Detection Systems Wael Kanoun, Nora Cuppens-Boulahia, Frédéric Cuppens, José Araujo
Session R6: Regular Papers
« QoS for security management »
Reputation based clustering algorithm for security management in ad hoc networks with liars Mohamed Elhoucine Elhdhili, Lamia Ben Azzouz, Farouk Kamoun
Quality Assurance of Grid Service Provisioning by Risk Aware Managing of Resource Failures Axel Keller, Kerstin Voss, Dominic Battré, Matthias Hovestadt, Odej Kao
EESP: A Security Protocol that Supports QoS Management Mahmoud Mostafa, Anas Abou El Kalam, Christian Fraboul
10h30-11h00
Coffee Break
11h00-12h30
Session R7: Regular Papers
« Security in Sensor Networks »
Economic-based vs. Nature-inspired Intruder Detection in Sensor Networks Fatma Mili, Swapna Ghanekar, Nancy Alrajei
11h00-12h30
Session R8: Regular Papers
« Cryptography and electronic vote »
Apport de la cryptographie elliptique dans le vote électronique Yousfi Souheib, Bonnecaze Alexis, Riadh Robbana
Application Framework for High Security Requirements in R&D Environments Based on Quantum Cryptography Christian Kollmitzer, Oliver Maurhart, Stefan Rass, Stefan Schauer
New timestamping schemes in the bounded storage model Essia BEN SHIL, Kaouther BLIBECH, Riadh Robbana